Cover image for Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings
Title:
Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings
Series:
Lecture notes in computer science ; 2332
Publication Information:
New York, NY : Springer-Verlag, 2002
ISBN:
9783540435532
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010061219 QA76.9.A25 E87 2002 Open Access Book Proceedings, Conference, Workshop etc.
Searching...

On Order

Summary

Summary

This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002.
The 33 revised full papers presented were carefully reviewed and selected from a total of 122 submissions. The papers are organized in topical sections on cryptanalysis, public-key encryption, information theory and new models, implementational analysis, stream ciphers, digital signatures, key exchange, modes of operation, traitor tracing and id-based encryption, multiparty and multicast, and symmetric cryptology.


Table of Contents

Rosario Gennaro and Daniele MicciancioSang Jin Lee and Eonkyung LeeSteven D. Galbraith and Florian Hess and Nigel P. SmartRonald Cramer and Victor ShoupYevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti YungJee Hea An and Yevgeniy Dodis and Tal RabinJoan Daemen and Vincent RijmenUeli MaurerAlexander Russell and Hong WangDavid P. Woodruff and Marten van DijkJunko Nakajima and Mitsuru MatsuiJohn A. Clark and Jeremy L. JacobYoung-Ho Park and Sangtae Jeong and Jongin LimPhilippe Chose and Antoine Joux and Michel MittonMatthias KrauseJovan Dj. Golić and Vittorio Bagini and Guglielmo MorgariIvan Damgård and Maciej KoprowskiJean-Sébastien CoronHenri Gilbert and Marine MinierCraig Gentry and Mike SzydloEmmanuel Bresson and Olivier Chevassut and David PointchevalRan Canetti and Hugo KrawczykDonald BeaverAnand Desai and Alejandro Hevia and Yiqun Lisa YinJohn Black and Phillip RogawayStephen KentTal Malkin and Daniele Micciancio and Sara MinerMichel Abdalla and Jee Hea An and Mihir Bellare and Chanathip NamprempreJunji Shikata and Goichiro Hanaoka and Yuliang Zheng and Hideki ImaiAggelos Kiayias and Moti YungJeremy Horwitz and Ben LynnMatthias Fitzi and Nicolas Gisin and Ueli Maurer and Oliver von RotzYvo Desmedt and Yongge WangAnne Canteaut and Marion VideauSerge Vaudenay
Cryptanalysis I
Cryptanalysis of a Pseudorandom Generator Based on Braid Groupsp. 1
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groupsp. 14
Extending the GHS Weil Descent Attackp. 29
Public-Key Encryption
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryptionp. 45
Key-Insulated Public Key Cryptosystemsp. 65
On the Security of Joint Signature and Encryptionp. 83
Invited Talk
AES and the Wide Trail Design Strategyp. 108
Information Theory & New Models
Indistinguishability of Random Systemsp. 110
How to Fool an Unbounded Adversary with a Short Keyp. 133
Cryptography in an Unbounded Computational Modelp. 149
Implementational Analysis
Performance Analysis and Parallel Implementation of Dedicated Hash Functionsp. 165
Fault Injection and a Timing Channel on an Analysis Techniquep. 181
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphismsp. 197
Stream Ciphers
Fast Correlation Attacks: An Algorithmic Point of Viewp. 209
BDD-Based Cryptanalysis of Keystream Generatorsp. 222
Linear Cryptanalysis of Bluetooth Stream Cipherp. 238
Digital Signatures I
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groupsp. 256
Optimal Security Proofs for PSS and Other Signature Schemesp. 272
Cryptanalysis II
Cryptanalysis of SFLASHp. 288
Cryptanalysis of the Revised NTRU Signature Schemep. 299
Key Exchange
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptionsp. 321
Universally Composable Notions of Key Exchange and Secure Channelsp. 337
On Deniability in Quantum Key Exchangep. 352
Modes of Operation
A Practice-Oriented Treatment of Pseudorandom Number Generatorsp. 368
A Block-Cipher Mode of Operation for Parallelizable Message Authenticationp. 384
Invited Talk
Rethinking PKI: What's Trust Got to Do with It?p. 398
Digital Signatures II
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periodsp. 400
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Securityp. 418
Security Notions for Unconditionally Secure Signature Schemesp. 434
Traitor Tracking & Id-Based Encryption
Traitor Tracing with Constant Transmission Ratep. 450
Toward Hierarchical Identity-Based Encryptionp. 466
Multiparty and Multicast
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratchp. 482
Perfectly Secure Message Transmission Revisitedp. 502
Symmetric Cryptology
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysisp. 518
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLSp. 534
Author Indexp. 547